Design and simulate wireless networks the network simulator

Assignment Help Computer Networking
Reference no: EM132290142

Wireless networks performance evaluation

Purpose of the assessment

The purpose of the assignment is to compare the wireless communication technologies and evaluate their performance. Students will be able to complete the following ULOs:

b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

Assignment Description

Wireless networks performance varies from wired networks, the latter uses a guided medium and wireless networks use unguided medium for transmission. To design and simulate wireless networks the network simulator - 2 (NS - 2), an open source discreet event simulator could be used. The NS-2 simulator is a widely used simulation tool, which could generate trace files for analysis and comes with a network animator to visualize the network performance.

This assessment requires students to compare and evaluate the performance of wireless routing protocols using the NS-2. The assessment requires students to design a wireless network topology in NS-2 and evaluate the generated trace files for two different wireless routing protocols. The students are required to carry out a critical analysis of the results of the two routing protocols, by plotting graphs and discussing the outcomes.

The students are required to:

• Design a wireless network consisting of 20 nodes; the dimensions for the given topology are 400x300. The agent type should be UDP and the traffic CBR. The simulation should run for 300 seconds. Uniform deployment of nodes is required and the nodes are required to transmit packets over the network. The wireless node configuration should include the NS-2 energy model.

• Run the simulation on two different routing protocols such as DSDV, AODV, DSR, and TORA. Critically analyse the trace files in terms of packets sent, received, dropped and energy consumed. These parameters should be plotted on graphs and discussed in detail

• Include screenshots of the NAM displaying the nodes uniformly deployed during the simulation and add at least 3 screen shots of the simulation.

• Appendix I should include the tcl srcript used in each simulation.

Attachment:- Wireless networks performance evaluation.rar

Verified Expert

This assignment we compare the ADOV and DSDV protocol using NS simulator tool. Our simulation based on given specification.The simulator network topology is dynamic topology. This assignment , we evaluate which protocol is best and find route of forwarding data packets from the source node to the destination node.We evaluate the protocol using effective factor of the number of nodes based on outputs of delay and throughput rate .

Reference no: EM132290142

Questions Cloud

Explain how cannabis works in the body : Explain how cannabis works in the body by including information regarding the endocannabinoid system (ECS) and endocannabinoid deficiency syndrome.
System development life cycle model : Based on the System Development Life Cycle Model, what could be done to help the project succeed? and how to avoid failure
What are the implications of pushing : What are the implications of pushing the use of technology and DNA manipulation
What impact would warehouse consolidation have : What impact would the three new alternatives have on transfer and customer freight costs? Why?
Design and simulate wireless networks the network simulator : Design and simulate wireless networks the network simulator - 2 (NS - 2), an open source discreet event simulator could be used
Consider a disk with n cylinders numbered : Consider a disk with n cylinders numbered sequentially 0, 1, 2,...., n-1. The read/write head is currently on cylinder 800. The queue of requests to be serviced
Discussan overview of the objective data : Discussan overview of the objective data and expected normal physical examination findings for this body system. Discuss special physical assessment examination
Track and sector that holds that block : We need to get to block 29137. Fill in the surface, track and sector that holds that block.
Forecasting methods are useful in turning market research : Which evidence-based forecasting methods are useful in turning market research results into sales forecasts?

Reviews

len2290142

4/22/2019 12:27:56 AM

Please read description and marking criteria given for assignment carefully.Thank you Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 4 Report Layout Report layout, style and language 5 Network Design The network topology shown in the NAM 5 Simulation Three simulation screen shots for each routing protocol at 50s, 150s and 250s simulation time with description of the ongoing events. 12 Trace file analysis Provide a critical analysis of the two trace files in terms of packets sent, received, dropped and energy consumption. 8 Results Plot the graphs for packets sent, received, dropped and energy consumption for the two protocols. 8 Conclusion Write summary of the report 4 Reference style Follow IEEE reference style 4 Appendix 1 The tcl files for each routing protocol 10 Total 60

Write a Review

Computer Networking Questions & Answers

  Networking solution - wan communications between sites

The management team would like a networking solution which would offer easier troubleshooting, less down time, and WAN Communications between sites. They would like t he WAN Connections to support 256 Kbps of data and several telephone conversatio..

  Define the authenticated data structures

Authenticated Data Structures. You are designing SecureBox, an authenticated online file storage system. For simplicity, there is only a single folder.

  Suppose a client computer with ip address 1271929230 in

suppose a client computer with ip address 127.192.92.30 in building zz requests a large web page from the server in

  Identify risks inherent in the use of wireless

Write a two to three (2-3) page paper in which you: 1. Identify risks inherent in the use of wireless and mobile technologies.

  Implement the above network using single area ospf

Implement the above network using single area OSPF. All PC should be able to ping all PC and Router interfaces - USQNetwork has a private network in which

  What is scope planning and scope creeping

Based on your understanding of project planning and budgeting, express your views on the following: What is scope planning and scope creeping? What are some of the ways to avoid problems and manage scope correctly

  Analyze how and why this has made things more convenient

Discuss at least two ways in which HTML5 has improved the way web designers and developers work with images.

  What is the subnet mask called in linux

What command is used to find out where a file comes from?

  Create a new organisational unit in active directory

Create a new Organisational Unit (OU) in Active Directory called ‘test unit'. In the test unit OU, create a group policy with appropriate user account security (Group) policies (as found in the IT Operational Plan).

  Protocol implementations to permit all nodes to communicate

Illustrate how many protocols and protocol implementations are required to permit all nodes to communicate?

  Despite the large volume of notes written about telnet

Despite the large volume of notes written about TELNET, it can be argued that the protocol is still not well-defined.

  Benefits-drawbacks of entering into a mentoring relationship

Using the Internet, research and read about mentoring. Based on your reading, post your responses to the following topics of discussion:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd